An Overview of Quantum Key Distribution Protocols
Abstract
Keywords: |
CV-QKD; DI-QKD; DV-QKD; MDI-QKD; public cryptography QKD; QKD; quantum cryptography
|
Full Text: |
References
P. Shor, “Algorithms for Quantum Computation: Discrete Logarithms and Factoring”, in Proc. 35th Annu. Symp. on Foundations of Computer Science, Santa Fe, NM, USA, 1994. https://doi.org/10.1109/sfcs.1994.365700
B. Qi, L. Qian, H-K. Lo, “A brief introduction of quantum cryptography for engineers”, 2010.
ETSI, “Quantum Safe Cryptography and Security”, White Paper No. 8, June 2015.
L. Grover, “A fast quantum mechanical algorithm for database search,” in Proc. of 28th ACM Symposium on Theory of Computing, ACM Press, New York, NY, 1996, pp. 212–219. https://doi.org/10.1145/237814.237866
DelftX, “The Quantum Internet and Quantum Computers: How Will They Change the World”, QTM1x Lecture notes, 2018.
W. Heisenberg, “The Physical Content of Quantum Kinematics and Mechanics,” in J. A. Wheeler, and W. H. Zurek, Eds., Quantum Theory and Measurement, Princeton, Princeton University Press, 1927, pp. 62–84.
A. Einstein, B. Podolsky, N. Rosen, “Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?”, Phys. Rev. vol. 47, May 1935. https://doi.org/10.1103/PhysRev.47.777
W. K. Wootters, W. H. Zurek, “A Single Quantum Cannot Be Cloned”, Nature, vol. 299, pp. 802–803, 1982. https://doi.org/10.1038/299802a0
D. Wang, J. Wu, X. Yi, “Optical Quantum Computing”, in 11th International Conference on Natural Computation (ICNC), Zhangjiajie, China, 2015. https://doi.org/10.1109/ICNC.2015.7378022
Quintessence labs, “Quantum Key Distribution Systems Compared”, White Paper #2, December 2014.
C. H. Bennett, and G. Brassard, “Quantum Cryptography: Public Key Distribution and Coin Tossing,” in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, 10–12 December, 1984, pp. 175–179.
A. K. Ekert, “Quantum cryptography based on Bell's theorem”, Physical Review Letters, vol. 67, August 1991. https://doi.org/10.1103/PhysRevLett.67.661
C. H. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin, “Experimental Quantum Cryptography”, in Journal of Cryptology, vol. 5, no. 1, pp. 3–28, 1992. https://doi.org/10.1007/BF00191318
C. H. Bennett, “Quantum cryptography using any two non-orthogonal states”, Phys. Rev. vol. 68, pp. 3121–3124, 1992.
K. Inoue, E. Waks, and Y. Yamamoto, “Differential-phase-shift quantum key distribution using coherent light”, Physical Review A., vol. 68, 2003. https://doi.org/10.1103/PhysRevA.68.022317
H. Bechmann-Pasquinucci, N. Gisin, “Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography”, Phys. Rev. A. vol. 59, no. 6, pp. 4238–4248, 1999. https://doi.org/10.1103/PhysRevA.59.4238
W.-Y. Hwang, “Quantum key distribution with high loss: toward global secure communication”, Physical Review Letters, vol. 91, 2003. https://doi.org/10.1103/PhysRevLett.91.057901
V. Scarani, A. Acin, G. Ribordy, and N. Gisin, “Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulses implementations”, Phys. Rev. Lett., vol. 92, 057901, 2002. https://doi.org/10.1103/PhysRevLett.92.057901
M. M. Khan, M. Murphy, and A. Beige, “High error-rate quantum key distribution for long distance communication”, New J. Phys., vol. 11, 2009. https://doi.org/10.1088/1367-2630/11/6/063043
D. Stucki, S. Fasel, N. Gisin, Y. Thoma, and H. Zbinden, “Coherent one-way quantum key distribution”, 2007.
M. Lucamarini, K. A. Patel, J. F. Dynes, B. Fröhlich, A. W. Sharpe, A. R. Dixon, Z. L. Yuan, R. V. Penty, and A. J. Shields, “Efficient decoy-state quantum key distribution with quantified security”, Optics Express, vol. 21, no. 21, pp. 24550–24565, 2013. https://doi.org/10.1364/OE.21.024550
A. A. Abushgra and K. M. Elleithy, “A Shared Secret Key Initiated by EPR Authentication and Qubit Transmission Channels”, in IEEE Access, vol. 5, pp. 17753–17763, 2017. https://doi.org/10.1109/ACCESS.2017.2741899
Y. Mu, J. Seberry, and Y. Zheng, “Shared Cryptographic Bits Via Quantized Quadrature Phase Amplitudes of Light”, in Optical Communications, vol. 123, pp. 344–352, 1996. https://doi.org/10.1016/0030-4018(95)00688-5
N. Gisin, G. Ribordy, H. Zbinden, D. Stucki, N. Brunner, and V. Scarani, “Towards practical and fast quantum cryptography”, 2004.
D. Mayers, A. Yao, “Quantum Cryptography with Imperfect Apparatus”, in Proc. of the 39th Annual Symposium on Foundations of Computer Science, 1998, p. 503. https://doi.org/10.1109/sfcs.1998.743501
H.-K. Lo, M. Curty, and B. Qi, “Measurement-Device-Independent Quantum Key Distribution,” Physical Review Letters, vol. 108, no. 13, Mar. 2012. https://doi.org/10.1103/physrevlett.108.130503
E. Esteban, H. Serna, “Quantum Key Distribution protocol with private-public key”, May 2012
E. H. Serna, “Quantum Key Distribution from a random seed”, Nov. 2013.
C. Branciard, N. Gisin, B. Kraus, and V. Scarani, “Security of two quantum cryptography protocols using the same four qubit states”, Phys. Rev. A., vol. 72, 2005. https://doi.org/10.1103/physreva.72.032301
DOI: 10.7250/itms-2018-0005
Refbacks
- There are currently no refbacks.
Copyright (c) 2018 Anastasija Trizna, Andris Ozols
This work is licensed under a Creative Commons Attribution 4.0 International License.